Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication

Similar documents
Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks

An Extended Localized Algorithm for Connected Dominating Set Formation in Ad Hoc Wireless Networks

Low Power Hitch-hiking Broadcast in Ad Hoc Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks

On Reducing Broadcast Redundancy in Ad Hoc Wireless Networks

Connected Dominating Set in Sensor Networks and MANETs

Algorithms for minimum m-connected k-tuple dominating set problem

Ad hoc and Sensor Networks Topology control

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS

Connected Dominating Sets in Wireless Networks with Different Transmission Ranges

On minimum m-connected k-dominating set problem in unit disc graphs

Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point

Learning Automata Based Algorithms for Finding Minimum Weakly Connected Dominating Set in Stochastic Graphs

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks

Ad hoc and Sensor Networks Chapter 10: Topology control

Algorithms for Minimum m-connected k-dominating Set Problem

Mobility-Sensitive Topology Control in Mobile Ad Hoc Networks

Motivation and Basics Flat networks Hierarchy by dominating sets Hierarchy by clustering Adaptive node activity. Topology Control

A3: A Topology Construction Algorithm for Wireless Sensor Networks

A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks

A DISTRIBUTED TOPOLOGY CONTROL ALGORITHM FOR MANETS

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks

Localized Broadcasting in Mobile Ad Hoc Networks Using Neighbor Designation

ANALYZE AND EVALUATE THE IMPLEMENTATION OF CDS ALGORITHMS USING THE MOBILE AGENT.. 1 RAFAT AHMED ALHANANI, 2 JAAFAR ABOUCHABAKA, 3 RAFALIA NAJAT

Constructing weakly connected dominating set for secure clustering in distributed sensor network

BROADCASTING is the most frequently used operation in

Chapter 6 DOMINATING SETS

An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks

Weakly-Connected Dominating Sets and Sparse Spanners in Wireless Ad Hoc Networks

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

The Encoding Complexity of Network Coding

EFFICIENT DISTRIBUTED ALGORITHMS FOR TOPOLOGY CONTROL PROBLEM WITH SHORTEST PATH CONSTRAINTS

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Pervasive and Mobile Computing. Improved sensor network lifetime with multiple mobile sinks

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks

Broadcasting and topology control in wireless ad hoc networks

A Distributed Formation of Orthogonal Convex Polygons in Mesh-Connected Multicomputers

On Maintaining Sensor-Actor Connectivity in Wireless Sensor and Actor Networks

Theorem 2.9: nearest addition algorithm

1 The Traveling Salesperson Problem (TSP)

A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks

arxiv: v2 [cs.ds] 25 Jan 2017

Wireless Sensor Networks 22nd Lecture

Energy-Efficient Algorithm for Broadcasting in Ad Hoc Wireless Sensor Networks

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks

SMART: A Scan-Based Movement-Assisted Sensor Deployment Method in Wireless Sensor Networks

Polynomial-Time Approximation Scheme for Minimum Connected Dominating Set in Ad Hoc Wireless Networks. Technical Report

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Randomized Algorithms for Approximating a Connected Dominating Set in Wireless Sensor Networks

A CSP Search Algorithm with Reduced Branching Factor

Module 6 NP-Complete Problems and Heuristics

Introduction to Graph Theory

COMP Analysis of Algorithms & Data Structures

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

An algorithm for Performance Analysis of Single-Source Acyclic graphs

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions

IN WIRELESS SENSOR NETWORKS

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas. Fei Dai, Member, IEEE, and Jie Wu, Senior Member, IEEE

Broadcasting Techniques for Mobile Ad Hoc Networks

Agreedy approximation for minimum connected dominating sets

Mobility Control for Complete Coverage in Wireless Sensor Networks

1 Introduction. Networking and Computing (MobiHoc), Author Samir Das s work has been partially supported by NSF grant ANI

Energy-Efficient Range Assignment in Heterogeneous Wireless Sensor Networks

AN ad hoc wireless network, or simply ad hoc network,

Broadcasting and Activity-Scheduling in Ad Hoc Networks

A Comparative Analysis between Forwarding and Network Coding Techniques for Multihop Wireless Networks

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Minimum connected dominating sets and maximal independent sets in unit disk graphs

Utility-Based Data-Gathering in Wireless Sensor Networks with Unstable Links

Module 6 P, NP, NP-Complete Problems and Approximation Algorithms

Chapter 8: Energy Conservation. MANETs. Prof. Yuh-Shyan Chen Department t of Computer Science and Information Engineering

AN ad hoc wireless network is a special type of wireless

Control Frame Shaping in Power Controlled and Directional MAC Protocols

Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Constructing Maximum-Lifetime Data Gathering Forests in Sensor Networks

The Postal Network: A Versatile Interconnection Topology

Dual Power Management for Network Connectivity in Wireless Sensor Networks

Networking Sensors, II

The complement of PATH is in NL

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

Number Theory and Graph Theory

Time-Bounded Essential Localization for Wireless Sensor Networks

Algorithms for A Connected Dominating Set in Wireless Networks

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 3, MAY

A synchronizer generates sequences of clock pulses at each node of the network satisfying the condition given by the following definition.

Simulations of the quadrilateral-based localization

Transcription:

Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication Jie Wu, Mihaela Cardei, Fei Dai, and Shuhui Yang Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL Department of Electrical and Computer Engineering North Dakota State University Fargo, ND 0 Abstract We propose a notion of extended dominating set where each node in an ad hoc network is covered by either a dominating neighbor or several -hop dominating neighbors. This work is motivated by cooperative communication in ad hoc networks whereby transmitting independent copies of a packet generates diversity and combats the effects of fading. We first show the NPcompleteness of the minimum extended dominating set problem. Then, several heuristic algorithms, global and local, for constructing a small extended dominating set are proposed. These are non-trivial extensions of the existing algorithms for the regular dominating set problem. The application of the extended dominating set in efficient broadcasting is also discussed. The performance analysis includes an analytical study in terms of approximation ratio and a simulation study of the average size of the extended dominating set derived from the proposed algorithms. Keywords: Ad hoc network, connectivity, cooperative communication, dominating set, simulation. This work was supported in part by NSF grants ANI 00, CCR 0, CNS 0, CNS 0, and EIA 00. Contact address: jie@cse.fau.edu

Introduction The nature of ad hoc networks makes them different from wireless infrastructure networks which typically include base stations that are not battery constrained. Energy management strategies can conserve the energy of the battery powered nodes by taking advantage of the energy available at base stations. In contrast, an ad hoc network consists of small, battery powered devices only. The development of new energy management techniques is critical for practical deployment of these networks. Dominating set (DS) has been widely used in the selection process of an active node set. A set is dominating if every node in the network is either in the set or a neighbor of a node in the set. When active nodes form a dominating set, all nodes in the network are also said to be reachable. When a DS is connected, it is denoted as a CDS; that is, any two nodes in the DS can be connected through intermediate nodes from the DS. CDS as a connected virtual backbone has been widely used for broadcast process [], searching in a reduced space, and point coverage in sensor networks []. Because of the promiscuous receiving mode of wireless sensors, when each node in a CDS forwards the packet once, all nodes in the network will receive the packet. In Fig. (a), the dominating node set {u, v, w} forms a virtual backbone for efficient broadcasting, since only dominating nodes need to forward the packet and all remaining nodes can receive the packet without having to forward it. Power saving techniques for ad hoc networks can be classified into two categories: power saving protocols and power control for transmission. The former aims to put wireless nodes into periodical sleep state in order to reduce power consumption. Power control for transmission manages energy consumption by adjusting transmission ranges. It was experimentally confirmed by Feeney and Nilsson in [] that the difference in energy consumption between an idle node and a transmitting node is not major, while a major difference exists between idle and sleep states of nodes. Specifically, it is shown in Span [] that the ratio of energy for transmit, receive, idle, and sleep is :::. In this paper, we focus on power saving protocols in which a small set of active nodes is maintained at any given period, although such a set can change over time. Recently, the cooperative communication (CC) technique [] was exploited to study energy management issues for ad hoc and sensor networks. Such as in [], a network model using CC is developed to deal with broadcasting in ad hoc networks. In CC, transmitting independent copies of a packet generates diversity and combats the effects of fading. In this way, k copies of the same packet can potentially reach a receiver outside the normal transmission range with the same baseline transmit power.

x w u y t x w u y (a) v z (b) v z Figure : (a) A sample network: {u, v, w} forms a CDS and {u, v} forms an ECDS. (b) Another sample: {x, u, v} forms an EWCDS. In this paper, we propose a notion of extended dominating set based on the cooperative communication. A DS is called an extended dominating set (EDS) if for every node in the network, it is in the set, it has a neighbor in the set, or it has k -hop neighbors in the set. In Fig. (a), u, v, w forms a CDS. If using CC, and k =, node x is covered twice by two -hop neighbors, u and v. w can be withdrawn and {u, v} forms an EDS. Since the set is connected, it is also called extended connected dominating set (ECDS). Later, we will define two notions of connectivity: strongly connected (ECDS by default) and weakly connected (EWCDS). The connectivity is defined in terms of the success of a broadcast process: a packet from a source in EDS will be received by all other nodes, given that each node in EDS forwards the packet once, after it receives the complete packet. In EWCDS, the broadcast will be successful for at least one source in EDS; whereas in ECDS the broadcast will be successful for any source in EDS. In Fig. (b), {u, v, x} forms an EWCDS for k = since x can retrieve the complete packet when either u or v is the source, while neither u nor v can when x is the source. we focus on algorithms designed for unit disk graphs, which is the most popular model used in literature for wireless network analysis. This paper focuses on some non-trivial extensions of various methods for ECDS/EWCDS formation and shows their applications in the broadcast process. More specifically, we will focus on the following technical issues related to ECDS/EWCDS: () The complexity of determining a minimum EDS, ECDS or EWCDS. We will show that these problems are NP-complete. () Heuristic solutions to the minimum ECDS/EWCDS problems. We will propose four types of solutions: global for EWCDS based on Guha and Khuller s MCDS, quasi-global for EWCDS based on Alzoubi, Wan, and Frieder s maximal independent set approach, quasi-local for ECDS based on the clustering approach, and local for ECDS based on Wu and Li s marking process. () Application of ECDS/EWCDS. We will focus on an application in efficient broadcasting. () Activity scheduling and rotation for local

solutions. We will discuss different ways to rotate and schedule active nodes under certain global constraints, including global coverage. () Performance analysis. We will conduct performance analysis, through analytical and simulation studies on the proposed solutions. The remainder of the paper is organized as follows. Section reviews the related work in the field. Section gives a new geometric graph model from which the extended dominating set is defined. The NP-completeness of finding a minimum extended dominating set (EDS) and a minimum extended strongly/weakly connected dominating set (ECDS/EWCDS) are also proved in this section. Section presents several non-local heuristic algorithms for EDS and EWCDS. Section proposes the local solution for ECDS. Applications and related issues are discussed in Section. A performance study through simulation is conducted in Section. The paper concludes in Section. Background and Related Work. Cooperative communication (CC) Extensive research has been done in the area of cooperative communication (CC) [, ]. The basic idea is the use of single-antenna nodes in a multi-user scenario to share their antennas to create a virtual multiple-input multiple-output (MIMO) system. CC can potentially combine the following advantages: () the power savings provided by multi-hopping, () the spatial diversity provided by the antennas of separate mobile nodes, and () node cooperation can also lead to increased data rates []. There are several cooperative signaling methods [], including detect and forward methods, amplify-and-forward methods, and coded cooperations. In our model, no synchronization is required, that is, the receiver can assemble k copies of the same packet received at different time. In CC, there are two thresholds on the received signal s SNR (signal-to-noise ratio): γ p for successful decoding, and γ acq timing acquisition. A packet received with SNR γ is () a failed reception, when γ < γ acq, () a partial reception, when γ acq γ < γ p, or () a full reception, when γ p γ. Suppose a node has to partial receptions of the same packet, with γ and γ. If γ + γ γ p, combining these two partial receptions achieves a full reception. This combining process can be extended to multiple partial receptions. The channel gain is often modelled as a power of distance, therefore, γ/γ p = (r/d ij ) α, where d ij is the distance between nodes i and j, r is the communication range of nodes, and α is a communication medium dependant parameter. The header of a message is

coded in a different way that requires a lower SNR (γ acq ) to decode. Therefore, the combiner knows which packet a partial reception belongs to. Signal combining can be performed whenever new partial reception is made in a incremental way. Many partial receptions of a packet do not require extra storage space. Discussions of the CC technique and its applications in ad hoc networks can be found in [, ]. This technique (referred to as hitchhiking) has been exploited by Agarwal et al [] to reduce the total energy consumption in a broadcast process. A heuristic algorithm was used to build a rooted tree that covers the entire network. Then local optimization steps were performed at each level of the tree, where the extra coverage provided by higher level transmissions is used for the transmission power reduction at the current level. Cardei et al [] extended the work in [] to address the topology control problem.. Dominating set and its extensions Finding the minimum dominating set (DS) and minimum connected dominating set (CDS) is NPcomplete in both regular graphs [] and unit disk graphs []. Finding an extended (weakly) connected dominating set (ECDS and EWCDS), which takes the advantages of the CC technique, has not been exploited except in []. Note that an ECDS/EWCDS is different from a weakly connected dominating set (WCDS) [, ]. A WCDS W of a network is a set such that the subnetwork, consisting of all nodes in the network and all adjacent links to nodes in W, is connected. Basically, a WCDS is a DS such that it is connected when treating all nodes in the DS within two hops as adjacent. The difference between a WCDS and an ECDS/EWCDS is that WCDS cannot guarantee a full coverage under the CC in broadcasting. That is, in order to achieve full delivery in a broadcasting, both WCDS nodes and some non-wcds nodes need to forward the broadcast packet. For example, in Fig. (b), {x, u, v} is considered WCDS (and EWCDS) and {x, u, z} is also WCDS (but not EWCDS). This subsection reviews existing CDS formation protocols for wireless ad hoc and sensor networks. Based on their efficiency in terms of forming a small CDS and overhead in terms of message and time complexity, these protocols were classified into four categories in []: global, quasi-global, quasi-local, and local. A global protocol assumes a central point in the network, where global information is available and CDS membership is computed based on this information. Global protocols usually yield the smallest CDS, but their application is limited due to the high maintenance cost. Das

et al [] proposed a global protocol based on Guha and Khuller s approximation algorithm []. This algorithm, MCDS, is based on growing a tree from a selected root until all nodes are covered. Non-leaf nodes form a CDS. MCDS has an O(log ) approximation ratio in regular graphs, where is the maximum number of neighbors of a node. Recently, Cheng et al [0] proposed a polynomial time approximation scheme (PTAS) for the minimum CDS in unit disk graphs. Given a network of size n and a small parameter s, Cheng et al designed a ( + /s)-approximation with running time n O((s log s)). A quasi-global protocol relies on global coordination rather than global information. The computation, starting from a central point, is propagated in a sequential manner to the entire network. Then, a maximal independent set (MIS) is constructed from the tree. An independent set (IS) is a special type of DS where any two nodes in DS are not adjacent. These protocols usually have a small constant approximation ratio in unit disk graphs, but the high overhead of the global infrastructure makes them less attractive in dynamic networks. Alzoubi, Wan, and Frieder [] have proposed a quasi-global algorithm (called AWF here) with an approximation ratio of in unit disk graphs. Nodes in the DS are selected from a spanning tree so that when a gateway node is selected by each DS node, the DS becomes a CDS. AWF takes O(n) rounds to complete. A quasi-local protocol assumes no central point. However, sequential propagation of information is still possible and, sometimes, expanded to the entire network. These protocols have a large constant approximation ratio in unit disk graphs, but moderate overhead since nodes are selected in parallel to form an MIS. A cluster-based quasi-local algorithm usually contains two phases as in the AWF algorithm. At first, the network is partitioned into clusters; a clusterhead is elected for each cluster. Then clusterheads are interconnected to form a CDS. Unlike in AWF, one or two gateways are needed to connect clusterheads separated by two and three hops. Several clustering algorithms have been proposed [, ] to elect clusterheads. In most approaches for gateway selection [, 0, ], neighboring clusterheads are connected via a mesh structure through a local selection by each clusterhead. These protocols have O() approximation ratios in unit disk graphs. In the worst case, it takes O(n) rounds for them to complete due to the sequential information propagation in the clustering process. But on average, the expected number of rounds is O(log n). A local protocol relies only on local information, i.e., properties of nodes within its vicinity. In addition, there is no sequential propagation of any partial computation result. The status of each node depends on its l-hop topology only for a small constant l, and is usually determined after l rounds

p Hello v r r y v u w x o t s r q (a) (b) Figure : (a) Neighbor detection. (b) A sample extended marking process and extended pruning rule. of information exchange among neighbors. Local protocols do not have a constant deterministic approximation ratio, but in random unit disk graphs, the expected size of the resultant CDS is O() times that of the minimum CDS. Wu and Li [, ] proposed the marking process and two pruning rules that select a few nodes to form a CDS. The approach uses -hop information and converges after two rounds of information exchange. Dai and Wu [] further extended this scheme to use a more efficient pruning rule that ensures a probabilistic approximation ratio. Other local CDS algorithms include Span [], Multipoint relay (MPR) [, ], and core-based approaches [, ]. Extended Dominating Set. A new geometric graph model Here we consider a special geometric graph to approximate the CC model: Given a set V of points in a D space, a normal transmission range r, and a CC range r, we define a graph with vertex set V and an arc from vertex v to vertex u iff the Euclidean distance, d(v, u), from v to u is no more than r. In addition, a quasi-arc from vertex v to vertex u iff r < d(v, u) r. When r = r, the corresponding graph can be approximated by a single unit disk graph, where a quasi-arc exists between any two vertices (called quasi neighbors) that are separated by two hops. When r r (normally r < r), each vertex maintains its regular arcs (the corresponding node is called a regular neighbor, or simply, neighbor) and quasi-arcs (the corresponding node is called a quasi neighbor) through Hello messages (see Fig. (a)). It should be stressed that once -hop neighborhood is

derived it is used to derive k-hop neighborhood without resorting to Euclidean distance information. For example, quasi neighbors are derived from -hop neighbors of neighbors. It is assumed that when a quasi neighbor of v sends a packet, v can receive only a partial packet. However, v can assemble the complete packet after it receives k copies of the packet from k quasi neighbors. It is still assumed that when a regular neighbor of v sends a packet, v can receive the complete packet provided no collision occurs. It is also assumed that the network is sparse or moderately dense, where the communication and computation overhead of the proposed approaches is limited. If the network is extremely dense, the network should be first sparsified as discussed in [].. Definition of extended dominating set Our objective is to find a minimum connected backbone so that nodes outside the backbone can be put in a sleep state. The backbone construction using the CC feature can be formulated as extended dominating set (EDS) and extended connected dominating set (ECDS). Definition A subset of nodes is an EDS if every node is (a) in the subset, (b) a regular neighbor of a node in the subset, or (c) a quasi neighbor of k nodes in the subset. When r = r and k =, every node is (a) in the subset, (b) a -hop neighbor of a node in the subset, or (c) a two-hop neighbor of nodes in the subset. Note that the regular dominating set (DS) is also an EDS. Under the regular physical model, the connectivity is defined as follows: Two nodes are connected if there exists a sequence (path) of regular neighbors. Under the CC model, nodes are connected not only via regular neighbors but also via quasi neighbors. Definition A set is strongly connected under the CC model if for any node u in the set sending a packet, the packet should be fully received by all other nodes. Only nodes with a fully received packet (including u) are able to forward the packet once. If the connectivity condition holds at least for a particular node u, the set is called weakly connected. A strongly connected EDS is denoted as ECDS and a weakly connected EDS is denoted as EWCDS. In Fig. (b), {u, v, x} forms an EWCDS while {u, w, x} forms an ECDS. It is known that the dominating set and connected dominating set problems in unit disk graphs (UD-DS and UD-CDS)

are NP-complete []. The following theorem shows that EDS, ECDS and EWCDS are NP-complete. The theorem can be proved by showing that these problems belong to the NP class and either UD-DS or UD-CDS is a special case for each problem. Theorem EDS, ECDS, and EWCDS problems are NP-complete. Proof: It is easy to see that EDS, ECDS and EWCDS belong to the NP-class. Given a vertex subset, it can be verified in polynomial time whether it forms an EDS, ECDS, or EWCDS with CC model. First, we show that UD-DS is a special case of EDS. Recall from our previous graph definition that any node v has associated a radius pair (r v, r v) such that r v r v, and any quasi neighbor u satisfies the relation r v d(v, u) r v. A subset of nodes is an EDS if any node is (a) in the subset, (b) has a neighbor in the subset, or (c) has k quasi neighbors in the subset. When r v = r v for any node v, we will have no case of quasi neighbor or quasi neighbor domination. That is, any node is either part of the EDS or has a neighbor in the EDS. Hence, we say that the UD-DS is a special case of the EDS problem, for r v = r v for v V. Next, we show that UD-CDS is a special case of ECDS and EWCDS problems when r v = r v for v V. When r v = r v for v V, a subset of nodes S is an ECDS if the nodes in S are connected and any node in V is either part of S or has a neighbor in S. Therefore, ECDS reduces to the UD-CDS problem. Also, for the case r v = r v for v V, a subset of nodes S is an EWCDS if connectivity holds for at least a node u in S, and any node in V is either part of S or has a neighbor in S. If the connectivity holds for node u, then there exists a path from u to any other node in S and this is equivalent with a connected dominating set S. Therefore, EWCDS reduces to the UD-CDS problem. Since UD-DS and UD-CDS are NP-complete and one of them is a particular case of the EDS, ECDS and EWCDS problems, and because EDS, ECDS, and EWCDS belong to the NP-class, we conclude that EDS, ECDS, and EWCDS are NP-complete problems. Non-Local Heuristic Solutions. Global solutions for EWCDS First, we consider a centralized greedy solution, called extended MCDS (E-MCDS), similar to Guha and Khuller s MCDS [] for the minimum EWCDS. However, the notion of contribution is used

here: each forward node contributes to all its neighbors and /k to all quasi neighbors. The problem is to find a minimum EWCDS so that all other nodes are reachable (i.e., each node has a signal energy of at least ). The effective contribution of v to u is v s contribution to u before the signal energy of u reaches. The initial signal energy of each node is zero. For example, suppose the signal energy of node u is 0. before v forwards the message and k =, the effective contribution of v to u is 0. if they are neighbors and is 0. if they are quasi neighbors. A node is said to have the maximum effective contribution if it has the maximum total effective contribution to its neighbors and quasi neighbors. In E-MCDS, the node with the maximum effective contribution is selected as a source to grow a tree. At each round, a neighbor of the tree with the maximum effective contribution is selected until the signal energy of each node in the network is at least. For ease of description, we assume r = r and k = in the following discussion. Nevertheless, all algorithms and theorems in this paper, after a minor revision, also apply to the general situation with any constant ratios r /r and k. Algorithm Extended MCDS (E-MCDS). (Initialization) All nodes are initially colored white, except that the node with the maximum effective contribution is colored gray (and will be the root).. Select the gray node that has the maximum effective contribution to its white neighbors (regular and quasi).. Update the signal energy level for every regular or quasi neighbor of the selected gray node.. The selected gray node is colored black and its white regular neighbors are marked gray. If the signal energy of a white quasi neighbor is at least, that neighbor is marked gray also.. Repeat steps,, and until the signal energy level of each node is at least. Although our simulation study shows that the E-MCDS has good performance in terms of producing a small EWCDS, it does not produce a constant approximation ratio. Note that the original MCDS algorithm by Guha and Khuller [] does not have a constant approximation ratio either, since it was designed for general graphs, not for unit disk graphs. In order to provide a worst-case guarantee, we refine the first global algorithm using the concept of independent set. A set S of nodes is an independent set (IS) if all pairwise nodes in S are not adjacent. If S is also a dominating set, it is called a maximal independent set (MIS). Our second global algorithm is the same as the first algorithm with one important difference. Two black colors, black and black are used to mark nodes in the EWCDS. In addition, the following mutual exclusion rule must be observed. Mutual Exclusion Rule: When a gray node is added to the EWCDS, it has color black if it has no black neighbors and black if it has no black neighbors. A gray node with both black and black 0

neighbors cannot be added to the EWCDS. Enforcing the above rule will not leave any white nodes uncovered; otherwise, let w be a white node with a gray neighbor g. Node g has at most one black neighbor. It can be legally colored as either black or black and cover w. If g has two black neighbors, their total contribution to w is, and w is already covered. Since a black node cannot have black neighbors, then all the black nodes form an IS. Similarly, all black nodes also form an IS. Let G r = (V, E r ) be the unit disk graph with radius r without considering the CC model. Similarly, G r is the unit disk graph with radius r, and DS hop is a dominating set for graph G r. Lemma If S is an IS of G r, then S EDS opt, where EDS opt is the optimal solution of the EDS problem. Proof: Let DS hop opt = {v, v,..., v opt } be the optimal solution of the DS hop problem, and S i the set of nodes in S dominated by v i in G r. It has been proved in [] that the number of IS nodes in a circle with radius r is at most π(r + r ) /π( r ) =. That is, S i for i =,,..., opt. As DS hop dominates S V, we have S = S S... S opt. Therefore, S S + S +... + S opt DS hop opt Finally, DS hop opt EDS opt because any EDS of G r is also a DS of G r. Lemma DS opt EDS opt DS opt, where DS opt and EDS opt are the optimal solutions for the DS and EDS problems. Proof: The relation EDS opt DS opt is clear since any solution of the DS problem is also a solution of the EDS problem. Let us take an MIS, S. Then S is also a dominating set, resulting in DS opt S. Using Lemma, S EDS opt. Therefore, DS opt EDS opt. Theorem The extended MCDS algorithm with the mutual exclusive rule has a constant approximation ratio for the EWCDS problem. Proof: Let U be the set of black nodes, U black the set of black nodes and U black the set of black nodes. Both U black and U black are IS of G r and U = U black + U black. From Lemma, U black EW CDS opt and U black EW CDS opt. Therefore, U 0 EW CDS opt.

0 0 0 0 0 0 Figure : An example to illustrate EWCDS by E-MCDS. The extended MCDS algorithm runs on a single central node, which collects global information and disseminates the resultant EWCDS to the entire network. Information collection and dissemination takes Θ(H) rounds for network diameter H. The computation cost of the central node is O(nD log n) for a network with n nodes and deployment density D. The algorithm selects at most n EWCDS nodes each of which affects effective contributions of up to π(r) D = O(D) nodes within hops. The positions of these nodes in a sorted list need to be adjusted with O(log n) cost each. Fig. shows the EWCDS generated by the E-MCDS algorithm in a random 0 nodes connected graph. There are nodes,, 0,, and 0, in the resultant EWCDS with the source 0. We can see that every other node has at least two different -hop paths or one -hop path to reach nodes in EWCDS. Fig. (a) shows the EWCDS generated by the E-MCDS algorithm in a random 00 nodes connected graph. There are nodes in the resultant EWCDS, and node is the source. There are CDS nodes (not shown in the figure) generated by MCDS of the same graph.. Quasi-global solutions for EWCDS First, we give a simple version of the AWF algorithm proposed by Alzoubi, Wan, and Frieder [] for CDS which is also a trivial solution for ECDS with a constant approximation ratio. Then, we

propose a solution for the EWCDS problem, by using the extended connectivity concept to reduce the dominating set. Algorithm AWF Algorithm. (Topological sorting) A spanning tree is built via flooding from a pre-defined root. Each node v in the spanning tree is given a rank r v = (l v, id v ), where l v is v s level (i.e., distance to root), and id v is v s ID. Node ranks form a total order.. (Sequential clustering) Initially, all nodes are white. In the sequence from the lowest rank (the root) to the highest rank, each node determines its color. If a node has no neighboring black nodes with lower ranks, it becomes a black node.. (Gateway designation) Each non-root black node selects a white neighbor with a lower rank as its gateway, which connects this black node to another black node with a lower rank. It has been proved in [] that () all black nodes form an MIS, and () the set of black and gateway nodes is a CDS of the network. Obviously, the black node set also forms an EDS, and the black and gateway node set forms an ECDS. In fact, AWF has a constant performance ratio for the ECDS problem. Let U be the set of both black and gateway nodes, and S the MIS selected in step. The number of nodes used in step is at most one fewer than the number of nodes in S. Therefore U S. Based on the Lemma, S EDS opt and since EDS opt ECDS opt we obtain U < 0 ECDS opt. In our extended AWF algorithm (E-AWF) for EWCDS, the first two steps (topological sorting and sequential clustering) are the same as in the original AWF algorithm. The third step is changed as follows: Extended Gateway Designation: Each non-root black node designates a neighbor with a lower rank as its gateway, only when it is not reachable from black and gateway nodes with lower ranks; otherwise, this black node does not designate a gateway. Theorem The set of black nodes and gateways selected by the E-AWF algorithm is an EWCDS. Proof: Let S be the set of black nodes. Based on [], S is an MIS and EDS of the network. To show the weak connectivity, we show that any black node in S is reachable from the root. The root is reachable by default. Suppose all black nodes with ranks lower than r v are reachable (i.e., they have received the complete packet), we show that black node v is also reachable. v has designed a gateway

g only when it is not reachable, then g is reachable from a black node b satisfying r b < r g < r v. Therefore, gateway g will receive the packet from b and forward it to v. The E-AWF algorithm has a constant approximation ratio for the EWCDS problem. This is because the number of black nodes selected by the E-AWF is exactly the same as in the original AWF. The number of gateways selected by the extended gateway designation rule is at most the same as in the original AWF. Therefore, the size of the EWCDS formed by the E-AWF is no larger than that by the original AWF, which has a constant approximation ratio. The E-AWF algorithm takes O(n) rounds to converge in the worst case and O(H) rounds in the best case. The computation cost of each node is O(D). We use the same example graph of Fig. to illustrate E-AWF. Applying E-AWF to that graph, we will have the EWCDS = {,,,,,, 0,,, 0}, in which {,, } are the gateways and is the source. Node and 0 are connected to through 0 and using the connectivity concept under CC model. Otherwise, as the result of AWF, nodes and are both selected to make the set connected. Fig. (b) shows the EWCDS generated by the E-AWF algorithm in a random 00-node connected graph. There are nodes in the resultant EWCDS, and node is the source. There are CDS nodes generated by AWF for the same graph (not shown in the figure).. A quasi-local solution for EDS and ECDS In this subsection, we consider a quasi-local solution for the minimum disconnected EDS and then extend the solution for ECDS. By a quasi-local solution, we mean the solution completes with a high probability in a small number of rounds with an occasional large number of rounds for completion. This approach is similar to a clustering algorithm with two major differences: () The coverage is under the CC model. () Each node operates on its -hop neighborhood, rather than its -hop neighborhood in the regular clustering approach. Nodes in the network are classified into black (selected), gray (covered by a black node), partial gray (partially covered by one or more black nodes), and white (clean). The priority of each node is defined by either its node ID or its node degree (-hop or -hop) as long as the priority is a total order. Therefore, in case of a tie in node degree, node ids can be used to break the tie. Initially, all nodes are colored white. The black nodes (also called clusterheads) generated in the extended clustering form a disconnected EDS and an IS. From Lemma, the extended clustering algorithm has a constant approximation ratio for the EDS problem. To extend EDS to ECDS, we need each clusterhead to connect

0 0 0 0 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 00 0 0 00 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 0 0 0 00 0 0 00 0 0 0 0 0 0 0 00 0 0 0 0 00 0 00 0 0 00 (a) EWCDS by E-MCDS, source is 0 0 0 0 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 00 0 0 00 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 0 0 0 00 0 0 00 0 0 0 0 0 0 0 00 0 0 0 0 00 0 00 0 0 00 (b) EWCDS by E-AWF, source is 0 0 0 0 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 00 0 0 00 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 0 0 0 00 0 0 00 0 0 0 0 0 0 0 00 0 0 0 0 00 0 00 0 0 00 (c) ECDS by E-Clustering with gateways 0 0 0 0 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 00 0 0 00 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 0 0 0 00 0 0 00 0 0 0 0 0 0 0 00 0 0 0 0 00 0 00 0 0 00 (d) ECDS by E-Rule K Figure : Sample ECDS or EWCDS in a random network with 00 nodes. to neighboring clusterheads within hops. To find a small number of gateways to connect all the neighboring clusterheads without resorting to global information, we use an extension of Li, Hou and Sha s local minimum spanning tree (LMST) [] algorithm on neighboring clusterheads. Unlike the traditional gateway designation algorithm, whereby each clusterhead is connected to all of its neighboring clusterheads and thus the CDS is a mesh structure (Cluster-Mesh), in LMST, each node constructs a local minimum spanning tree within its -hop neighborhood, and marks the links to its on-tree neighbors only. Note that the on-tree neighbor set is usually a subset of -hop neighbor set. It is proved that all the marked links together with all the nodes can form a connected graph. In our extension, the -hop neighborhood includes the current clusterhead CH and all clusterheads within hops, along with their pairwise virtual distance in terms of hop count. The IDs of the two end nodes of a virtual link can be used to break a tie in hop count if needed. In this way, each pair

Algorithm Extended Clustering (E-Clustering). A white node with the highest priority within its -hop white neighborhood is colored black.. A partial gray node is colored black if (a) there is no white neighbor within its -hop neighborhood, and (b) it has the highest priority among all partial gray nodes in its -hop neighborhood.. For any recently-turned black node, its neighbors are colored gray if they are either white or partial gray. Signal energy of quasi neighbors are adjusted and their colors are changed accordingly. That is, a white quasi neighbor is changed to partial gray. A partial gray node with signal energy level of at least is changed to gray. of neighboring clusterheads has a virtual link with a virtual distance. When a virtual link is selected in LMST, i.e., a link connecting CH to a neighboring clusterhead, all nodes on the virtual link are selected as gateways. Algorithm Localized Tree-based Gateway Designation (E-Cluster-LMST). Each clusterhead constructs a local minimum spanning tree (LMST) among all the clusterheads within its -hop neighborhood rooted at itself, using virtual links.. Each clusterhead selects the on-tree neighbors and marks all the intermediate nodes as gateways on the virtual links to these neighbors. Theorem The EDS generated by extended clustering and gateway nodes together form an ECDS which has a constant approximation ratio. Proof: First, we prove the connectivity of resultant dominating set including clusterheads and gateways. We show that all the clusterheads are connected by virtual links. Arbitrarily select two clusterheads CH u and CH v and assume the shortest path between them in the original graph is (CH u, u, u,..., u k, CH v ). For each u i ( i k), its clusterhead CH i is within hops of u i. Therefore, any two adjacent clusterheads in sequence CH u, CH, CH,..., CH k, CH v are separated by at most hops. When each clusterhead connects to all clusterheads within hops through virtual links, CH u and CH v are connected. Based on [], if the original virtual graph is connected, the subgraph induced by the virtual links selected by LMST is still connected. Each virtual link consists of gateways used to connect two clusterheads. Therefore, clusterheads together with gateways appearing in the selected virtual links form a connected graph. Then, we prove the constant approximation ratio of the resultant ECDS. From previous discussion, we know that the size of clusterheads U that form

an EDS has a constant approximation ratio. In local tree-based gateway designation, each clusterhead at most has all the clusterheads within its -hop neighborhood as its LMST neighbors, which is bounded by O() []. Therefore, the gateways designated by each clusterhead is at most O() ( gateways on a virtual link at most). We can have now the size of selected clusterheads and gateway nodes to be U + O() U in the worst case. Therefore, it has a constant approximation ratio. The clustering process takes O(n) rounds in the worst case, and O(log n) rounds on average. The computation cost of clustering is O(D) for each node, and that of neighborhood designation is O(D) in building a distance vector of O() neighboring clusterheads, and O() in LMST construction. Applying E-Clustering and E-Cluster-LMST to the graph in Fig., we have the EDS = {,,, } and the ECDS = {,,,,, 0,,, 0} respectively. Fig. (c) shows the ECDS generated by E-Clustering with gateways in a random 00-node connected graph. The clusterheads are noted by diamonds, and the gateways by bold circles. There are nodes in the resultant ECDS, of which clusterheads are in the EDS. There are CDS nodes generated by clustering with gateways on the same graph, of which clusterheads form the DS (not shown in the figure). Local Heuristic Solutions. A local solution for EDS and ECDS In local backbone construction, each node maintains only -hop neighborhood information. The local solution consists of two steps: () use Wu and Li s marking process [] and Dai and Wu s pruning rule [] for constructing the CDS. Note that a CDS is also an ECDS. () Adopt an aggressive pruning rule to remove nodes from the CDS while still maintaining local coverage and connectivity. Specifically, Wu and Li s marking process is the following: Marking Process []: A node is temporarily marked if it has two neighbors that are not directly connected. It has been shown in [] that the temporarily marked node set is a CDS. When the marking process is applied to the example in Fig., the temporarily marked node set {v, u, w, x, o, s, t} forms a CDS. After a set of temporarily marked nodes is derived by applying the marking process, it can be further reduced via the following pruning rule.

Pruning Rule K []: A temporarily marked node u can be unmarked if all its -hop neighbors (N (u)) are also neighbors of any one of K coverage nodes that are connected and have higher priorities. When each node in N (u) is a neighbor of C, u is said to be covered by C. In Fig. (b), {w, v} covers u and, hence, u can be unmarked. A restricted version of the above pruning rule exists, where all coverage nodes must be -hop neighbors of the unmarked node. For example, node u in Fig. (b) cannot be unmarked based on the restricted Rule K, because w is not a neighbor of u. It was proved in [] that the reduced set of temporarily marked nodes is still a CDS after applying pruning Rule K, either restricted or non-restricted. In the extended pruning rule (E-Rule K), -hop neighborhood information, including temporary markers of all -hop neighbors, is needed. A temporarily marked node u can be unmarked if all its -hop neighbors, regular and quasi, can be covered by other temporarily marked nodes in the neighborhood, and the corresponding condition is called coverage condition. Let C be a set of temporarily marked nodes with higher priority than u within u s -hop neighborhood. Again, the priority of a node can be node id and node degree. The neighbor set of node u, N (v), includes both regular and quasi neighbors. When the coverage condition holds, u is said to be (extendedly) covered by C. In Fig. (b), {w, x} covers v and, hence, v can be unmarked. Coverage Condition: A temporarily marked node u can be unmarked if for each v N (u), the collective energy contribution of C to v is at least. Theorem The set derived by the pruning rule based on the coverage condition forms an EDS. Proof: The set derived from the marking process is a CDS which is clearly an EDS. Consider a single application of the coverage condition on u in an EDS, since u is covered by other higher priority nodes in the EDS. The removal of u from the EDS will not change its extended dominating set property. When there are simultaneous removals, since the node priority is a total order, no cyclic dependence among nodes in terms of coverage will occur; the remaining nodes form an EDS. Note that the pruning rule based on the coverage condition does not guarantee an ECDS even though the set is an ECDS initially. To ensure connectivity, we require C to be connected under the CC model. We call C an extended component if it is strongly connected (based on Definition ). The fact that u is reachable from C is denoted as C u (i.e., the total energy contribution of C to u is at

least ). If C is a component (defined based on the regular connectivity), C can reach C, denoted as C C, if C u for a u in C. Next we give a procedure for constructing an extended component: Given a set of components (based on the regular connectivity), C, C,..., C m, the corresponding extended components are derived by iteratively merging two (regular and extended) components, C i and C j, whenever they satisfy C i C j and C j C i. In Fig. (b), C = {w, x} and C = {s, t} form two regular components. Since C C and C C, C and C can be merged into one extended component (based on Definition ). In Fig., the extended component {w, x, s, t} covers o and o is unmarked. Connectivity Condition: The coverage set C u for u is an extended component. In addition, each marked node in N (u) is adjacent to a node in C u. Theorem A pruning rule that meets coverage and connectivity conditions ensures an ECDS when the given set is ECDS. Proof: We use the following process of sequential removal to emulate the application of coverage and connectivity conditions: Nodes that are unmarked by these two conditions are first sorted in an ascending order of node priority. Then, nodes in the sorted list are removed one by one, with one per round. At each round, the node with the smallest priority is removed from the list. Assume that vertex u is selected at round l and it is the first node such that the coverage set C is an ECDS before its removal but C = C {u} is no longer an ECDS after its removal. We prove by contradiction that such a u does not exist and, therefore, the set after the sequential removal is still an ECDS. If v ( u) in C sends a packet, u will receive the packet fully since C is an ECDS. There is a marked node w in N (u) that excites u. That is, w forwards the packet to make an energy contribution to u. Based on the connectivity condition, w will excite all nodes in C u (the coverage set for u and a subset of C), which in turn will cover all nodes in N (u) (and the coverage condition holds). In this case, all marked nodes in N (u) fully receive the packet. Because u cannot make a contribution to any node outside N (u), u can be removed which is a contradiction. Note that any given network before pruning is a trivial ECDS and the CDS derived from the marking process is also a trivial ECDS. A better, pragmatic approach starts from the CDS derived from Dai and Wu s (restricted) pruning Rule K. The corresponding local solution is called (restricted) extended Rule K. Notice the similarity between the pruning Rule K and the coverage and connectivity conditions. The major difference is that Rule K does not use the CC model. Therefore, the connectivity

and component are defined in a normal term. In addition, the coverage is on u s -hop neighbor set and the connectivity condition is trivially satisfied in Rule K. Theorem The localized algorithm computes an ECDS of expected size O() ECDS opt, where ECDS opt is an optimal solution to the ECDS problem. Proof: The size of the ECDS is upper bounded by the number of temporarily marked nodes derived from the marking process and Rule K. It has been proved in [] that the expected number of temporarily marked nodes after applying Rule K is O() DS opt in unit disk graphs with both node IDs and locations being uniformly distributed, where DS opt is the minimal DS. The resultant ECDS is of size O() DS opt. By Lemma, DS opt O() EDS opt O() ECDS opt. The localized algorithm converges after rounds of Hello message exchanges: rounds to collect the -hop information for the marking process and Rule K, and additional rounds to disseminate temporary markers. Hello messages carrying -hop information are of size O(D). The computation complexity is O(D ) in constructing (extended) components and confirming coverage in a subgraph with O(D) nodes. Applying E-Rule K to the graph in Fig., we have the ECDS = {,,,,,, 0}. We can see that node can reach the ECDS using the CC technology. Otherwise, node will be added to make a CDS. Fig. (d) shows the ECDS generated by the extended Rule K in a random 00-node connected graph. There are nodes in the resultant ECDS. There are CDS nodes generated by Rule K in the same graph (not shown in the figure). Applications and Related Issues. Applications The ECDS/EWCDS can be used as a virtual backbone under the CC model. Such a backbone can support an efficient broadcast process and a searching space reduction. We use the broadcast process as an example. EWCDS can be used for a specific node whereas ECDS can be applied for any node to carry out a broadcast process. A typical broadcast process involves the following steps: () (At the source node s) If s is in EDS, s follows step ; if s has a neighbor u in EDS, it forwards the packet to u and u then follows step ; otherwise, s selects a neighbor v that has a neighbor u in EDS. In the last 0

case, s first forwards the packet and then u follows step after the packet is relayed by v. () (At an intermediate node u) If u is in EDS, it forwards the complete packet once; otherwise, it does nothing. Unlike broadcasting using regular DS, the source node may need a relay node (not in EDS) to forward the packet to a node in EDS; otherwise, only the nodes in EDS need to forward the packet once. Suppose y is the source node in Fig. (b), it forwards the packet to u in EDS. Each of u and v forwards once. After x assembles the two partial packets from u and v, it forwards the complete packet once to reach t. The construction of an EDS increases the overhead, but the impact is minimal compared with the benefit of reducing the number of forwarding nodes. From all distributed approaches, the localized solutions incur a minimal overhead. In addition, a localized solution is very efficient in a dynamic environment since it supports localized maintenance.. Activity scheduling/rotation The aim of the activity scheduling/rotation is to provide a good trade-off between minimizing energy consumption in sensor monitoring and prolonging the life span of each individual node. The backbone approach minimizes overall energy consumption by putting the maximum number of nodes in a sleep state. However, this comes with significant energy consumption by the nodes in the backbone. We propose to rotate the role of dominating (active) and non-dominating (sleep) nodes based on energy level in backbone construction. The localized scheduling/rotation can be as follows: Algorithm Localized Scheduling/Rotation. Apply the marking process and extended pruning rule to determine the marker (i.e., marked/unmarked status) of each node, so unmarked nodes can be put into sleep mode.. Each active node can judiciously lower its priority in the next round of scheduling (rule application). After an active node has lowered its priority (called tired), its new priority is propagated to - hop neighbors. Any changes of temporary markers are also propagated to -hop neighbors. Here we assume an asynchronous wake up scheme [, ] for communication among neighbors, and the propagation delay of each hop is bounded by the scheduling frame T. Therefore, the rotation process takes a non-trivial time period to complete. In a real situation, sensor nodes may fail (called off ) and new sensor nodes can be deployed (called on). An on/off operation can change the network topology and, hence, the corresponding ECDS needs to be modified, and the corresponding operation is called maintenance. In general, ECDS maintenance cannot be done in a localized way in non-local solutions

(such as the extended MCDS) without sacrificing performance (such as approximation ratio). On the other hand, an ECDS derived from the marking process and extended pruning rule can be maintained in a localized way, where only nodes in a small vicinity of on/off nodes need to modify their markers. Theorem In the restricted extended Rule K, only nodes within hops of a tired/on/off node need to change their final markers. Proof: Let u be a tired, on, or off node. First consider the temporary marker of a node v. Based on definitions of the marking process and restricted Rule K, the temporary marker of v depends only on the list of v s -hop neighbors, their priorities, and wireless links among them. As we have assumed that a wireless link does not break unless an end node switches off, the temporary marker of v remains the same if u is not a -hop neighbor of v. That is, only u s -hop neighbors need to change temporary markers. Then consider the final marker of a node w. Based on the coverage and connectivity conditions, the final marker of a node w depends only on the list of w s -hop neighbors, their priorities, their temporary markers, and wireless links among them. After excluding the impact of wireless links based on the previous assumption, w s final marker changes only when () u is within hops of w, or () u has a -hop v that is within hops of w and has changed its temporary marker. Therefore, w changes its final marker only when it is within hops of u. The above theorem shows that a tired/on/off node affects only nodes within hops, and the process converges after three rounds of Hello exchanges, which means a handover interval of T. For a smooth handover, the following rule is used to preserve an ECDS during a rotation process. Rotation Rule: All active nodes newly unmarked in a rotation process must stay active for additional three scheduling frames (T ) before switching to the sleep mode. Theorem The rotation rule preserves an ECDS during the rotation process. Proof: Let C(t) be the set of active nodes at time t. Assume the rotation process starts at t 0. By Theorem, C(t), the set of marked nodes, is an ECDS for t t 0. By Theorem, the rotation process converges no later than t 0 + T ; that is, C(t) is an ECDS for t t 0 + T. C(t 0 ) C(t) for t [t 0, t 0 + T ] by rotation rule. Because C(t 0 ) is an ECDS, C(t) is an ECDS during this period.